摘要:
Various cognitive communications system architectures and their corresponding Protocol Reference Models (PRMs) are disclosed. Such PRMs incorporate a Cognitive Plane in addition to conventional Data and Management Planes. The additional Cognitive Plane functionality may include, for example, spectrum sensing, spectrum management, geolocation, and security functions. The Cognitive Plane may further include a Policy Engine and a Learning and Reasoning Module. In some embodiments, Management Plane functions may be effectively combined to form a database of primitives (and their respective values) called a Management Information Base (MIB). In addition, techniques are provided by which various components of cognitive and non-cognitive, as well as mesh-enabled and non-mesh-enabled nodes in a network, inter-operate with each other. The architectures allow a Spectrum Manager (or Signal Space Manager) to combine information from various network layers (e.g., PHY/MAC Layers, Spectrum Sensing Function, Geolocation Function, and/or Security Sublayers), and to make informed decisions on spectrum utilization.
摘要:
Various cognitive communications system architectures and their corresponding Protocol Reference Models (PRMs) are disclosed. Such PRMs incorporate a Cognitive Plane in addition to conventional Data and Management Planes. The additional Cognitive Plane functionality may include, for example, spectrum sensing, spectrum management, geolocation, and security functions. The Cognitive Plane may further include a Policy Engine and a Learning and Reasoning Module. In some embodiments, Management Plane functions may be effectively combined to form a database of primitives (and their respective values) called a Management Information Base (MIB). In addition, techniques are provided by which various components of cognitive and non-cognitive, as well as mesh-enabled and non-mesh-enabled nodes in a network, inter-operate with each other. The architectures allow a Spectrum Manager (or Signal Space Manager) to combine information from various network layers (e.g., PHY/MAC Layers, Spectrum Sensing Function, Geolocation Function, and/or Security Sublayers), and to make informed decisions on spectrum utilization.
摘要:
Techniques are disclosed that allow for resource allocation during situations requiring co-existence in cognitive radios. Even under situations of bandwidth scarcity, the techniques allow various users to be guaranteed quality of service (QoS) by proper distribution and allocation of resources. The techniques allow wireless communication systems to operate in a normal mode and a co-existence mode. In the co-existence mode of operation, sub-frame creation, sharing and zone formation schemes are implemented that enable the existing underlying frame structure to remain intact and inter-operable with the legacy systems and at the same time, provide a guaranteed QoS. The zones effectively create partitions in space, time and frequency, which result in interference avoidance and allow various users in neighboring cells to communicate on the same frequencies.
摘要:
In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management and control messages as well as data traffic, thereby protecting information pertaining to node identification, node location, node-sensed incumbent transmissions, CRN frequency channel selections, and such like. During initial network registration, a temporary ID can be issued to a node, and then replaced once encrypted communication has been established. This prevents association of initial, clear-text messages with later encrypted transmissions. Elliptic curve cryptography can be used for mutual authentication between subscribers and the base station. ECC-based implicit digital certificates can be embedded in co-existence beacons used by CRN nodes to coordinate use of frequency channels, thereby preventing denial of service attacks due to transmitting of falsified beacons. Similar certificates can be embedded within identity beacons used to protect certain incumbents from interference by the CRN.
摘要:
Various cognitive communications system architectures and their corresponding Protocol Reference Models (PRMs) are disclosed. Such PRMs incorporate a Cognitive Plane in addition to conventional Data and Management Planes. The additional Cognitive Plane functionality may include, for example, spectrum sensing, spectrum management, geolocation, and security functions. The Cognitive Plane may further include a Policy Engine and a Learning and Reasoning Module. In some embodiments, Management Plane functions may be effectively combined to form a database of primitives (and their respective values) called a Management Information Base (MIB). In addition, techniques are provided by which various components of cognitive and non-cognitive, as well as mesh-enabled and non-mesh-enabled nodes in a network, inter-operate with each other. The architectures allow a Spectrum Manager (or Signal Space Manager) to combine information from various network layers (e.g., PHY/MAC Layers, Spectrum Sensing Function, Geolocation Function, and/or Security Sublayers), and to make informed decisions on spectrum utilization.
摘要:
Various cognitive communications system architectures and their corresponding Protocol Reference Models (PRMs) are disclosed. Such PRMs incorporate a Cognitive Plane in addition to conventional Data and Management Planes. The additional Cognitive Plane functionality may include, for example, spectrum sensing, spectrum management, geolocation, and security functions. The Cognitive Plane may further include a Policy Engine and a Learning and Reasoning Module. In some embodiments, Management Plane functions may be effectively combined to form a database of primitives (and their respective values) called a Management Information Base (MIB). In addition, techniques are provided by which various components of cognitive and non-cognitive, as well as mesh-enabled and non-mesh-enabled nodes in a network, inter-operate with each other. The architectures allow a Spectrum Manager (or Signal Space Manager) to combine information from various network layers (e.g., PHY/MAC Layers, Spectrum Sensing Function, Geolocation Function, and/or Security Sublayers), and to make informed decisions on spectrum utilization.
摘要:
Techniques are disclosed that allow for resource allocation during situations requiring co-existence in cognitive radios. Even under situations of bandwidth scarcity, the techniques allow various users to be guaranteed quality of service (QoS) by proper distribution and allocation of resources. The techniques allow wireless communication systems to operate in a normal mode and a co-existence mode. In the co-existence mode of operation, sub-frame creation, sharing and zone formation schemes are implemented that enable the existing underlying frame structure to remain intact and inter-operable with the legacy systems and at the same time, provide a guaranteed QoS. The zones effectively create partitions in space, time and frequency, which result in interference avoidance and allow various users in neighboring cells to communicate on the same frequencies.
摘要:
In some embodiments, authentication, confidentiality, and privacy are enhanced for a wireless network of cognitive radios by encryption of network management and control messages as well as data traffic, thereby protecting information pertaining to node identification, node location, node-sensed incumbent transmissions, CRN frequency channel selections, and such like. During initial network registration, a temporary ID can be issued to a node, and then replaced once encrypted communication has been established. This prevents association of initial, clear-text messages with later encrypted transmissions. Elliptic curve cryptography can be used for mutual authentication between subscribers and the base station. ECC-based implicit digital certificates can be embedded in co-existence beacons used by CRN nodes to coordinate use of frequency channels, thereby preventing denial of service attacks due to transmitting of falsified beacons. Similar certificates can be embedded within identity beacons used to protect certain incumbents from interference by the CRN.
摘要:
Apparatus and methods for providing efficient space-time structures for preambles, pilots and data for multi-input, multi-output (MIMO) communications systems are provided. One such embodiment includes providing a computer program that includes logic configured to provide an initial structure. The computer program further includes logic configured to verify that the rows of the initial structure are linearly independent and logic configured to apply an orthonormalization procedure to the initial structure to obtain a space-time structure. Methods are also provided for providing efficient space-time structures for preambles, pilots and data for MIMO communications systems.
摘要:
In a method of cognitive communication a system for generating non-interfering transmission, includes conducting radio scene analysis to find grey space using external signal parameters for incoming signal analysis without having to decode incoming signals.